Proceedings of the FRUCT’18

Saint-Petersburg, Russia, 18-22 April 2016

ITMO University, Saint-Petersburg, Russia. FRUCT Oy, Finland. ISSN 2305-7254, ISBN 978-952-68397-2-1(paperback), ISBN 978-952-68397-3-8 (PDF), 664 p.

Editors: Sergey Balandin, Tatiana Tyutina and Alla Levina

List of Full Papers

Authors

Title

Pages

Abdrashitov A., Spivak A.

Sensor Data Anonymization Based on Genetic Algorithm Clustering with
L-Diversity

3-8

Antonov A., Filippov A., Mamoutova O.

Next Generation FPGA-Based Platform for Network Security

9-14

Baranov S., Nikiforov V.

The Impact of Blocking Factor on Real-Time Applications Feasibility

15-20

Baranov S.

Real-Time Multi-Task Simulation in Forth

21-26

Bazhayev N., Lebedev I., Krivtsova I.,
Zikratov I.

Research Availability of Devices Based on Wireless Networks

27-32

Chuvilin K.

Machine Learning Approach to Automated Correction of LATEX Documents

33-40

Dovgalyuk P., Dmitriev D., Makarov V.

Platform-Independent Reverse Debugging of the Virtual Machines

41-47

Fujdiak R., Masek P., Mlynek P.,
Misurec J., Muthanna A.

Advanced Optimization Method for Improving the Urban Traffic Management

48-53

Galimullin M., Kalishenko E. Rapotkin N.

Performance Analysis of Thread Synchronization Strategies in Concurrent Data Structures Based On Flat-Combining

54-59

Gerasimova-Meigal L., Fedosova A., Meigal A.

Hand Skin Temperature: A Usability for Health Care Services

60-65

Haberland R., Krinkin K. Ivanovskiy S.

Abstract Predicate Entailment over Points-To Heaplets is Syntax Recognition

66-74

Ivaschenko A., Gorbachenko N.,
Kolsanov A., Kuzmin A.

Surgery Scene Representation in 3D Simulation Training SDK

75-84

Ivaschenko A., Lednev A., Diyazitdinova A.

P2P Outsourcing Model for Agile Project Tasks Allocation

85-91

Kashevnik A., Teslya N., Yablochnikov E., Arckhipov V., Kipriyanov K.

Hybrid Automated Line Workstations Interaction Scenario for Optical Devices Assembly

92-99

Khomonenko A., Gindin S.

Performance Evaluation of Cloud Computing Accounting for Expenses on Information Security

100-105

Klimentyev V., Sergienko A.

Detection of SCMA Signal with Channel Estimation Error

106-112

Kolchin M., Klimov N., Shilin I.,
Garayzuev D., Andreev A.

Unequal Temperature Changes in City: A Case Study Using a Semantic IoT Platform

113-119

Komar M., Edelev S., Koucheryavy Y.

Handheld Wireless Authentication Key and Secure Documents Storage for the Internet of Everything

120-130

Kondratyev A., Tishchenko I.

Concept of Distributed Processing System of Images Flow in Terms of
π-calculus

131-137

Korzun D., Marchenkov S., Vdovenko A., Borodulin A., Balandin S.

Performance Evaluation of Smart-M3 Applications: A SmartRoom Case Study

138-144

Kulakov K., Petrina O., Korzun D., Varfolomeyev A.

Towards an Understanding of Smart Service: The Case Study for Cultural Heritage e-Tourism

145-152

Lapaev M.

Automated Extraction of Concept Matcher Thesaurus from Semi-Structured Catalogue-Like Sources of Data on the Web

153-160

Lebedev A., Pavlov V., Khryashchev V., Stepanova O.

Face Detection Algorithm Based on a Cascade of Ensembles of Decision Trees

161-166

Lebedev I., Korzhuk V., Krivtsova I., Salakhutdinova K., Sukhoparov M.,
Tikhonov D.

Using Preventive Measures for the Purpose of Assuring Information Security of Wireless Communication Channels

167-173

Lebedev N., Timofeev I., Zavialova I.

Design and Implementation of the First Aid Assistance Service Based on Smart-M3 Platform

174-180

Levina A., Sleptsova D., Zaitsev O.

Side-Channel Attacks and Machine Learning Approach

181-186

Levina A., Taranov S.

New Construction of Algebraic Manipulation Detection Codes Based on Wavelet Transform

187-192

Makarov A., Yakovleva E.

Comparative Analysis of Halftoning Algorithms for Digital Watermarking

193-199

Masek P., Fujdiak R., Zeman K., Hosek J., Muthanna A.

Remote Networking Technology for IoT: Cloud-based Access for AllJoyn-enabled Devices

200-205

Maslennikov O., Komarov I.

Efficiency Metrics for Flocking with Implicit Leadership

206-211

Moldovyan N., Berezin A., Kornienko A., Moldovyan A.

Bi-Deniable Public-Encryption Protocols Based on Standard PKI

212-219

Namiot D., Sneps-Sneppe M.

On Physical Web Browser

220-225

Noskov A., Aminova E., Volokhov V.

Comparison of Image Focus Assessment Methods for Multi-focused Image Construction

226-232

Olenev V., Podgornova E., Lavrovskaya I.

Protocol for Deterministic Data Delivery in SpaceWire Networks

233-240

Orsino A., Ometov A.

Validating Information Security Framework for Offloading from LTE onto D2D Links

241-247

Osmolovskiy S., Ivanova E., Shakurov D., Fedorov I., Vinogradov V.

Hierarchical Real-Time Scheduling for Multicore Systems

248-256

Osmolovskiy S., Fedorov I., Vinogradov V., Ivanova E., Shakurov D.

Mixed-Criticality Scheduling in Real-Time Multiprocessor Systems

257-265

Palagushin V., Khomonenko A., Adadurov S.

Evaluation of Cryptographic Primitives Security Based on Proximity to the Latin Square

266-271

Ponomarev A.

Recommending Tourist Locations Based on Data from Photo Sharing Service: Method and Algorithm

272-278

Purtov K., Kublanov V., Petrenko A.,
Petrenko T.

Remote Photoplethysmography Application to Analysis Time-Frequency Changes of Human Heart Rate Variability

279-284

Romanov A., Ivannikov A.

SystemC NoC Simulation as the Alternative to the HDL and High-level Modeling

285-290

Sergeeva M., Ryabchikov I., Glaznev M., Gusarova N.

Classification of Pulmonary Nodules on Computed Tomography Scans. Evaluation of the Effectiveness of Application of Textural Features Extracted Using Wavelet Transform of Image

291-299

Sharov V., Bolshakov O., Petrov A.

Cross-Platform Programs Implementation for Specialized Distributed Embedded Systems

300-305

Smirnov A., Kashevnik A., Lashkov I.,
Baraniuc O., Parfenov V.

Smartphone-Based Identification of Dangerous Driving Situations: Algorithms and Implementation

306-313

Smirnova O., Tsvetkov M.

Maritime Safety Monitoring On The Northern Sea Route

314-320

Stepanov A.

The Application of Neural Network and Spline Wavelet Models in the Electroencephalogram Analysis Automation Process

321-327

Stepanov D., Tishchenko I.

The Concept of Video Surveillance System Based on the Principles of Stereo Vision

328-334

Suvorova E., Sheynin Y., Matveeva N.

Reconfigurable NoC Development with Fault Mitigation

335-344

Tsvetkov L., Spivak A.

Utilizing Type Systems for Static Vulnerability Analysis

345-350

Tupitsin G., Topnikov A., Priorov A.

Two-Step Noise Reduction Based on Soft Mask for Robust Speaker Identification

351-356

Viksnin I., Drannik A., Iureva R.,
Komarov I.

Flocking Factors' Assessment in Case of Destructive Impact on Swarm Robotic Systems

357-363

Viksnin I., Iureva R., Komarov I.,
Drannik A.

Assessment of Stability of Algorithms Based on Trust and Reputation Model

364-369

Viola F., D’Elia A., Roffia L., Cinotti T.

A Modular Lightweight Implementation of the Smart-M3 Semantic Information Broker

370-377

Voloshina N., Bezzateev S., Prudanov A.,
Vasilev M., Gorbunov A.

Effectiveness of LSB and MLSB Information Embedding for BMP Images

378-384

Vorobeva A.

Examining the Performance of Classification Algorithms for Imbalanced Data Sets in Web Author Identification

385-390

Zabrovskiy A., Kuzmin E., Petrov E.,
Fomichev M.

Emulation of Dynamic Adaptive Streaming over HTTP with Mininet

391-396

Zikhratov I., Pantiukhin I., Krivtsova I.,
Druzhinin N.

The Method of Elf-Files Identification Based on the Metric Classification Algorithms

397-403

Zikhratov I., Pantiukhin I., Sizykh A.

The Method of Classification of User and System Data Based on the Attributes

404-409

Zubok D., Kharchenko T., Maiatin A.,
Khegai M.

A Multi-Agent Approach to Monitoring of Cloud Computing System With Dynamically Changing Configuration

410-416